Author of the publication

Sensor Based Framework for Secure Multimedia Communication in VANET.

, , , , and . Sensors, 10 (11): 10146-10154 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems., , , and . FGCN (1), page 116-121. IEEE Computer Society, (2008)ISARE: An Integrated Software Architecture Reuse and Evaluation Framework., , , and . FGIT-ASEA, volume 117 of Communications in Computer and Information Science, page 174-187. Springer, (2010)Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A Fast and Secure One-Way Hash Function., , , and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 85-93. Springer, (2011)A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks., , and . IWCMC, page 1193-1198. IEEE, (2015)A Greedy Deep Learning Method for Medical Disease Analysis., , , , and . IEEE Access, (2018)Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks., , , and . IJDSN, (2012)A study on dynamic state information (DSI) around users for safe urban life., , , , , and . Computers & Mathematics with Applications, 63 (2): 554-563 (2012)U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home., , , and . The Journal of Supercomputing, 45 (1): 88-104 (2008)Security Requirements for Ubiquitous Software Development Site.. KES (2), volume 4252 of Lecture Notes in Computer Science, page 836-843. Springer, (2006)